lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <009e01c42489$207c19e0$3358b350@fucku>
Date: Sat, 17 Apr 2004 16:34:44 +0200
From: "Rafel Ivgi, The-Insider" <theinsider@....net.il>
To: "bugtraq" <bugtraq@...urityfocus.com>
Subject: Internet Explorer XSS published unpatched in SP1 AND SP2


Hi!

2 weeks ago i discovered this XSS:
<p id=cool align=center style="height: expression(alert('xss'))">s</p>
in Internet Explorer(fully patched and with SP2)

I also discoverd they Liu Die Yu(greetings pal) discovered it a long time 
ago.
<IMG width="0" height="0" style="width: expression(alert());">
More details at:
http://www.securiteam.com/windowsntfocus/6J006156AS.html

This means it was not patched, even in SP2.
This vulnerability does not effect outlook express.

Rafel Ivgi, The-Insider. 

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ